Editor's Note

Give a Paradigm Shift

SOME years ago, while working for the Air Force, a cool new word appeared. At least it was new to me. Paradigm. Back in the late 1980s, the Air Force began a paradigm shift to improve the way it conducted business. Instead of settling for average productivity, average business partners and average products, the Air Force would improve the quality of business all around.

The security industry, or at least the technology sector of the industry, has designated a new word to announce what's new and what's happening in the industry -- and it's convergence. Until the middle of August, convergence was the buzzword, but things have changed since then.

The Air Force is in the business of protecting our homeland and securing our freedom. Nonetheless, a paradigm shift was underway to employ a quality product by quality employees.

The security industry, or at least the technology sector of the industry, has designated a new word to announce what's new and what's happening in the industry -- and it's convergence. Until the middle of August, convergence was the buzzword, but things have changed since then.

Convergence is out, and interoperability is in.

That's right ... interoperability is the new paradigm shift.

While attending the 2006 Convergence & Campus Security Forum, sponsored by ADT, I learned plenty about technology and convergence, and if I use the word convergence too many times, feel free to substitute interoperability at will.

While conversing with the media, ADT's vice president of worldwide marketing Jamie Haenggi pointed out there is a two-pronged convergence phenomenon. Within product evolution, physical security devices become IP-enabled and ride on corporate networks, and the connectivity opens up significant new application opportunities, including business operations. She also said the theme of the convergence of physical and logical security blends common solution elements that emerge across physical security and MIS applications.

Within the customer dynamics of IT-enabled physical security, IT becomes an influencer, driver or co-owner. She said traditional security owners must engage with IT, which is often counter cultural. As you can image, there is a bit of tension between IT, physical security and preferred suppliers. The convergence of physical and logical security means the CIO becomes the solution architect, IT integrators' value proposition becomes more compelling, and the potential of a chief security officer owning all of the security now becomes a viable option.

The implications of convergence will require industry standards and regulations to adopt to rapid technology changes, and according to Haenggi, the implications of convergence trends also will redefine the traditional security space.

Because of convergence, or interoperability, there will be new decision makers and a commoditization of products. Security will improve its position in the value chain and will become more defined.

Haenggi said the convergence issue will leverage IT infrastructure for efficiency, mass storage and bandwidth, and it will allow customers to think more globally. Not that the economy isn't a global platform now, but new decision makers and influencers will take security into other areas such as merchandising, business operations and compliance.

See what I mean? We're standing at the security line of scrimmage and an audible is coming. Things are about to change. The changes will happen so quickly it may appear as though they've always been part of the infrastructure.

According to ADT's new COO John Koch, the traditional security market is undergoing significant changes which carry important implications for its North American operations. He said that his clients, the decision makers of their respected corporations, are shifting to CIOs and business leaders. Koch also said the technology evolution means a dual convergence of physical security and IT. This means that security devices are becoming IP-enabled, as well as the integration of physical and logical security.

All this means that technology advancements are creating new business opportunities in the data world and in business analytics. Traditional security products and services are being substituted by new technologies, and several vertical-specific technologies and applications are emerging.

The landscape also is changing in the competitive world of security. IT product companies, such as Cisco Systems, are entering the physical security marketplace. The industry also is watching system integrators move into security such as Accenture, IBM and TechData. There also will be many security product manufacturers making integrated products, such as GE Security, and there will be security players building IT and vertical-specific capabilities such as Red Hawk and Stanley Security. Red Hawk, however, has been acquired, or to be more specific at the time of this writing, is part of an acquisition agreement with United Technologies. This type of strategic acquisition melds electronics solutions such as video surveillance to physical equipment, such as safes, vaults and ATMs. UTC enhances its holdings as a fire safety and security solutions provider as a diversified company providing high technology products and services to the building and aerospace industry.

Koch, who is relatively new at ADT, comes to the multi-billion dollar company from the telephony world, expecting an era of convergence that continues with growth on both the top and bottom line. He said it's not likely that ADT will jump into the manufacturing industry, but I wouldn't bet against it. He does plan to grow the authorized dealer program, and part of his five-year interoperability plan is to seek convergence growth quickly, remain a leading provider of security services and see that the company drives the technology vehicle.

ADT will call an audible, but not one that is unexpected. Global growth, which every company in the world is seeking, is at the center of Koch's plans. He is quick to point out that China is at an epicenter of growth in the monitoring business, though he expects growth in the Middle East, Africa and Europe.

The paradigm shift is pretty clear at ADT. Plans for interoperability call for a continued, but more focused, worldwide development. The company's business model of having call centers that cover for one another, if needed, may be the perfect operating platform in a global marketplace -- I hope the employees in Denver can speak Mandarin.

This article originally appeared in the October 2006 issue of Security Products, pg. 6.

Featured

  • Secure Your Home During the Holidays

    The most wonderful time of the year can easily transform into a nightmare. Being vigilant, while still enjoying the holiday season, is possible. The holiday season is the perfect time to start implementing security measures to protect one’s home and ensure security while out and about. Read Now

  • Five Cybersecurity Trends Predictions for 2024

    According to Cybersixgill, threat research experts, AI’s evolution will continually improve both organizations’ cyber defense efforts and cybercriminal activities. At the same time, increasingly complex regulatory requirements, continued consolidation of cybersecurity tools, a widening attack surface, and heightened global geopolitical issues will all play a significant role in driving the direction of cybersecurity. Read Now

  • AI on the Edge

    Discussions about the merits (or misgivings) around AI (artificial intelligence) are everywhere. In fact, you’d be hard-pressed to find an article or product literature without mention of it in our industry. If you’re not using AI by now in some capacity, congratulations may be in order since most people are using it in some form daily even without realizing it. Read Now

  • NSA Report Focuses on How to Protect Against Evolving Phishing Attacks

    The National Security Agency (NSA) and U.S. partners have released a new report describing the latest techniques in phishing attacks and the defenses organizations can deploy against them. Read Now

Featured Cybersecurity

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3